Tag: Modern Applications

Can a Cloud Center of Excellence Help You Become Cloud Native?

Cloud computing has changed the fundamental structure of the enterprise IT department. While the benefits of cloud computing are well understood, effectively integrating the fundamental changes required to support cloud-native architectures properly is not as universally well-known. Enter the Cloud Center of Excellence (CCoE). The CCoE is an organizational structure designed to drive acceptance and adaptability of cloud constructs into the enterprise IT processes. The CCoE is a fundamental restr

๐Ÿ‘ป๐Ÿš๏ธ๐ŸŽƒ ScaryOps: The 3 Scariest Mistakes Companies Make in the Cloud

.button-table { padding: 12px 0 } First, there was DevOps. Then, ModernOps and CloudOps. Now, there is ScaryOps. Welcome to the special Halloween Edition of the Modern Digital Business podcast. In this episode, the 3 Scariest Mistakes Companies Make in the Cloud. It's time to turn our attention to scary things…scary movies, scary TV shows, scary home decorations, scary costumes. But when it comes to working with customers and clients on their cloud projects, sometimes I get quite scare

Donโ€™t Let Your Application Turn into Another Winchester Mystery House

Some time ago when I was living in Silicon Valley, I often drove by a curious-looking structure called the Winchester Mystery House every day on my way to work. The Winchester Mystery House is a San Jose mansion that was once the home of Sarah Winchester, the widow of William Winchester, and the heir to the Winchester Rifle fortune. Originally purchased in 1884 as an unfinished eight-room farmhouse, it was expanded over the course of 36 years to an overall footprint of 24,000 square feet.&nb

Five Best Practices for Managing Configurations in Cloud-Native Applications

Managing configuration information in a complex, cloud-native application can be daunting. There is seemingly configuration everywhere. There’s configuration describing the network interconnections in your system, including routing rules and port blocking. There’s configuration for your load balancers, determining where to send traffic destined for your service. There’s configuration for security permissions needed for databases, caches, servers, third-party applications, a

Identity, trust, and their role in modern applications

In the software world, identity is the mapping of a person, place, or thing in a verifiable manner to a software resource. Whenever you interact with nearly anything on the internet, you are dealing with identities: Facebook identity Email address Login name and password for a website Everyone has multiple identities—multiple ways that people know who you are and interact with you in the virtual world. Here are a few of my identities: Twitter: @leeatchison LinkedIn: leeatchison